Security Research

9 Tips to Help Secure Every Federal Employee’s Mobile Device

Bad actors increasingly target smartphones and endpoint devices that are generally less protected than government computers.

Critical Update: How Hackers Get Stuck In HADES

For the fourth season of Critical Update, the Nextgov team is diving into the latest developments in cybersecurity, beginning with the world’s biggest honeypot.

Twitter Bots Are Becoming More Human-Like: Study

In 2016, they were mostly retweeters on timers. Now they’re gathering intelligence.

Apple iPhones Could Have Been Hacked for Years—Here's What to Do About It

As there is no visible sign of infection on the device, it is likely users are completely unaware of the risks they’re facing.

This Site Shows the Security Risks of Your Smart Devices

A new website can help you understand the security risks internet-connected devices might bring into your home.

Pentagon, NSA Laying Groundwork for AI-Powered Cyber Defenses

Officials are developing a consistent framework for collecting cyber data, which could ultimately help train tools to monitor networks and detect suspicious behavior.

The Trump Administration’s Plan to Usher in ‘Second Bold Era’ of Science and Technology

The administration’s lead budget and science policy shops released an outline of funding priorities to maintain America’s competitiveness through research and development of new technologies.

The Pentagon Is Exploring New Ways to Isolate Its Networks

Three companies have already received multimillion-dollar contracts to explore new ways to protect the data flowing through the military’s IT systems.

This Bluetooth Security Flaw Affects Tons of Devices

There are simple workaround, researchers say.

Featured eBooks

DHS Asks for Feedback on Vulnerability Disclosure Program

Officials plan to create a public form where security researchers can submit weaknesses they uncover in the agency’s IT infrastructure.

CISA: Small Planes Vulnerable to Flight Data Manipulation

Pilots would be unable to tell the difference between the real and fake readings, “which could result in loss of control of the affected aircraft,” CISA officials warned.

How Penetration Testing Helps Agencies Spot Overlooked Cyber Threats

Security officials said the “ethical hacking” practice has been critical in helping them identify unseen risks.

CISA Cuts Deadline For Patching Critical Weaknesses In Half

A new binding operational directive requires agencies to patch critical vulnerabilities in just over two weeks.

How to Build a Better Password Than ‘123456’

The U.K.’s National Cyber Security Centre offers simple advice for people and organizations for more secure options.

Which Country has the Best Cybersecurity? It Isn’t the U.S.

A study says the U.S. is above average when it comes to cybersecurity, but it’s not the best nation.

The History of Women in Science Is Hidden in Plain Sight

By searching through footnotes, researchers found female programmers who made important but unrecognized contributions to genetics.